MPC with Synchronous Security and Asynchronous Responsiveness View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2020-12-05

AUTHORS

Chen-Da Liu-Zhang , Julian Loss , Ueli Maurer , Tal Moran , Daniel Tschudi

ABSTRACT

Two paradigms for secure MPC are synchronous and asynchronous protocols. While synchronous protocols tolerate more corruptions and allow every party to give its input, they are very slow because the speed depends on the conservatively assumed worst-case delay Δ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varDelta $$\end{document} of the network. In contrast, asynchronous protocols allow parties to obtain output as fast as the actual network allows, a property called responsiveness, but unavoidably have lower resilience and parties with slow network connections cannot give input.It is natural to wonder whether it is possible to leverage synchronous MPC protocols to achieve responsiveness, hence obtaining the advantages of both paradigms: full security with responsiveness up to t corruptions, and extended security (full security or security with unanimous abort) with no responsiveness up to T≥t\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T \ge t$$\end{document} corruptions. We settle the question by providing matching feasibility and impossibility results:For the case of unanimous abort as extended security, there is an MPC protocol if and only if T+2t More... »

PAGES

92-119

Book

TITLE

Advances in Cryptology – ASIACRYPT 2020

ISBN

978-3-030-64839-8
978-3-030-64840-4

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-030-64840-4_4

DOI

http://dx.doi.org/10.1007/978-3-030-64840-4_4

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1133108998


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "ETH Zurich, Zurich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "ETH Zurich, Zurich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Liu-Zhang", 
        "givenName": "Chen-Da", 
        "id": "sg:person.011544110647.05", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011544110647.05"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Maryland, College Park, USA", 
          "id": "http://www.grid.ac/institutes/grid.164295.d", 
          "name": [
            "University of Maryland, College Park, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Loss", 
        "givenName": "Julian", 
        "id": "sg:person.014730500045.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014730500045.52"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "ETH Zurich, Zurich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.5801.c", 
          "name": [
            "ETH Zurich, Zurich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Maurer", 
        "givenName": "Ueli", 
        "id": "sg:person.01316567627.91", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "IDC Herzliya, Herzliya, Israel", 
          "id": "http://www.grid.ac/institutes/grid.21166.32", 
          "name": [
            "IDC Herzliya, Herzliya, Israel"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Moran", 
        "givenName": "Tal", 
        "id": "sg:person.012022173111.00", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012022173111.00"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Concordium, Zurich, Switzerland", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Concordium, Zurich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Tschudi", 
        "givenName": "Daniel", 
        "id": "sg:person.011112577475.84", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011112577475.84"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2020-12-05", 
    "datePublishedReg": "2020-12-05", 
    "description": "Two paradigms for secure MPC are synchronous and asynchronous protocols. While synchronous protocols tolerate more corruptions and allow every party to give its input, they are very slow because the speed depends on the conservatively assumed worst-case delay \u0394\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$\\varDelta $$\\end{document} of the network. In contrast, asynchronous protocols allow parties to obtain output as fast as the actual network allows, a property called responsiveness, but unavoidably have lower resilience and parties with slow network connections cannot give input.It is natural to wonder whether it is possible to leverage synchronous MPC protocols to achieve responsiveness, hence obtaining the advantages of both paradigms: full security with responsiveness up\u00a0to t corruptions, and extended security (full security or security with unanimous abort) with no responsiveness up\u00a0to T\u2265t\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$T \\ge t$$\\end{document} corruptions. We settle the question by providing matching feasibility and impossibility results:For the case of unanimous abort as extended security, there is an MPC protocol if and only if T+2t
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-64840-4_4'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-64840-4_4'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-64840-4_4'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-64840-4_4'


 

This table displays all metadata directly associated to this object as RDF triples.

143 TRIPLES      23 PREDICATES      66 URIs      59 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-030-64840-4_4 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N37fb4a3dbd7e41d4b11bcf0b80043836
4 schema:datePublished 2020-12-05
5 schema:datePublishedReg 2020-12-05
6 schema:description Two paradigms for secure MPC are synchronous and asynchronous protocols. While synchronous protocols tolerate more corruptions and allow every party to give its input, they are very slow because the speed depends on the conservatively assumed worst-case delay Δ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\varDelta $$\end{document} of the network. In contrast, asynchronous protocols allow parties to obtain output as fast as the actual network allows, a property called responsiveness, but unavoidably have lower resilience and parties with slow network connections cannot give input.It is natural to wonder whether it is possible to leverage synchronous MPC protocols to achieve responsiveness, hence obtaining the advantages of both paradigms: full security with responsiveness up to t corruptions, and extended security (full security or security with unanimous abort) with no responsiveness up to T≥t\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T \ge t$$\end{document} corruptions. We settle the question by providing matching feasibility and impossibility results:For the case of unanimous abort as extended security, there is an MPC protocol if and only if T+2t<n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T + 2t < n$$\end{document}.For the case of full security as extended security, there is an MPC protocol if and only if T<n2\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T < \frac{n}{2}$$\end{document} and T+2t<n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$T + 2t < n$$\end{document}. In particular, setting t=n4\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$t = \frac{n}{4}$$\end{document} allows to achieve a fully secure MPC for honest majority, which in addition benefits from having substantial responsiveness.
7 schema:editor Nca779c3bf2ff4b6cbcf233ebc7a01bed
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Nea866252908f449cacc13931b911ff75
12 schema:keywords MPC
13 MPC protocols
14 abort
15 actual network
16 addition benefits
17 advantages
18 asynchronous protocol
19 benefits
20 cases
21 connection
22 contrast
23 corruption
24 delay
25 extended security
26 feasibility
27 full security
28 honest majority
29 impossibility results
30 input
31 low resilience
32 majority
33 more corruption
34 network
35 network connections
36 output
37 paradigm
38 parties
39 properties
40 protocol
41 questions
42 resilience
43 responsiveness
44 results
45 secure MPC
46 security
47 slow network connections
48 speed
49 substantial responsiveness
50 synchronous MPC protocols
51 synchronous protocol
52 worst-case delay
53 schema:name MPC with Synchronous Security and Asynchronous Responsiveness
54 schema:pagination 92-119
55 schema:productId N4ba7566d21b242978a46f8d4733e8821
56 N5ce3fc01e58a4ad890902531d41535eb
57 schema:publisher N0fea6c50d396472bbaa9751ad1661119
58 schema:sameAs https://app.dimensions.ai/details/publication/pub.1133108998
59 https://doi.org/10.1007/978-3-030-64840-4_4
60 schema:sdDatePublished 2022-05-20T07:46
61 schema:sdLicense https://scigraph.springernature.com/explorer/license/
62 schema:sdPublisher Nf1f0dada66dd47eda7b4f2cc24ac9b05
63 schema:url https://doi.org/10.1007/978-3-030-64840-4_4
64 sgo:license sg:explorer/license/
65 sgo:sdDataset chapters
66 rdf:type schema:Chapter
67 N0fea6c50d396472bbaa9751ad1661119 schema:name Springer Nature
68 rdf:type schema:Organisation
69 N37fb4a3dbd7e41d4b11bcf0b80043836 rdf:first sg:person.011544110647.05
70 rdf:rest Nf1a517ee74144cfd95a2862ad4afda59
71 N4408dd1eb1e640c1b748bc14ada3abf0 schema:familyName Moriai
72 schema:givenName Shiho
73 rdf:type schema:Person
74 N4ba7566d21b242978a46f8d4733e8821 schema:name doi
75 schema:value 10.1007/978-3-030-64840-4_4
76 rdf:type schema:PropertyValue
77 N5ce3fc01e58a4ad890902531d41535eb schema:name dimensions_id
78 schema:value pub.1133108998
79 rdf:type schema:PropertyValue
80 Na47474d9c14b4edab5e92dd48eaa0f1b schema:familyName Wang
81 schema:givenName Huaxiong
82 rdf:type schema:Person
83 Nab771490accf421ba811d42fd3af26d3 rdf:first Na47474d9c14b4edab5e92dd48eaa0f1b
84 rdf:rest rdf:nil
85 Nb2b511e06a8d471bbdb66b13df0d553f rdf:first sg:person.012022173111.00
86 rdf:rest Nf9909c8392a04414b8fbe49cd2872035
87 Nca779c3bf2ff4b6cbcf233ebc7a01bed rdf:first N4408dd1eb1e640c1b748bc14ada3abf0
88 rdf:rest Nab771490accf421ba811d42fd3af26d3
89 Nd5d3fd11f57a48dc9495a5e2a15e1519 rdf:first sg:person.01316567627.91
90 rdf:rest Nb2b511e06a8d471bbdb66b13df0d553f
91 Nea866252908f449cacc13931b911ff75 schema:isbn 978-3-030-64839-8
92 978-3-030-64840-4
93 schema:name Advances in Cryptology – ASIACRYPT 2020
94 rdf:type schema:Book
95 Nf1a517ee74144cfd95a2862ad4afda59 rdf:first sg:person.014730500045.52
96 rdf:rest Nd5d3fd11f57a48dc9495a5e2a15e1519
97 Nf1f0dada66dd47eda7b4f2cc24ac9b05 schema:name Springer Nature - SN SciGraph project
98 rdf:type schema:Organization
99 Nf9909c8392a04414b8fbe49cd2872035 rdf:first sg:person.011112577475.84
100 rdf:rest rdf:nil
101 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
102 schema:name Information and Computing Sciences
103 rdf:type schema:DefinedTerm
104 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
105 schema:name Data Format
106 rdf:type schema:DefinedTerm
107 sg:person.011112577475.84 schema:affiliation grid-institutes:None
108 schema:familyName Tschudi
109 schema:givenName Daniel
110 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011112577475.84
111 rdf:type schema:Person
112 sg:person.011544110647.05 schema:affiliation grid-institutes:grid.5801.c
113 schema:familyName Liu-Zhang
114 schema:givenName Chen-Da
115 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011544110647.05
116 rdf:type schema:Person
117 sg:person.012022173111.00 schema:affiliation grid-institutes:grid.21166.32
118 schema:familyName Moran
119 schema:givenName Tal
120 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012022173111.00
121 rdf:type schema:Person
122 sg:person.01316567627.91 schema:affiliation grid-institutes:grid.5801.c
123 schema:familyName Maurer
124 schema:givenName Ueli
125 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01316567627.91
126 rdf:type schema:Person
127 sg:person.014730500045.52 schema:affiliation grid-institutes:grid.164295.d
128 schema:familyName Loss
129 schema:givenName Julian
130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014730500045.52
131 rdf:type schema:Person
132 grid-institutes:None schema:alternateName Concordium, Zurich, Switzerland
133 schema:name Concordium, Zurich, Switzerland
134 rdf:type schema:Organization
135 grid-institutes:grid.164295.d schema:alternateName University of Maryland, College Park, USA
136 schema:name University of Maryland, College Park, USA
137 rdf:type schema:Organization
138 grid-institutes:grid.21166.32 schema:alternateName IDC Herzliya, Herzliya, Israel
139 schema:name IDC Herzliya, Herzliya, Israel
140 rdf:type schema:Organization
141 grid-institutes:grid.5801.c schema:alternateName ETH Zurich, Zurich, Switzerland
142 schema:name ETH Zurich, Zurich, Switzerland
143 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...